Cyber/Fraud Immersions

Monetising Data Dumps

Experience how to bypass encryption at scale, and turn a data dump into a valuable commodity.

  • 60min | in-person or virtual delivery
  • Modules

Monetising Data Dumps

markus-spiske-8oykwqgbskq-unsplash-2

About the Session

Discover the process of transforming a data dump into a valuable asset through bypassing encryption at scale. This hands-on workshop delves into the tools and techniques used by cybercriminals to monetise stolen data, offering insights into countermeasures and the balance between security and user experience.

Session Themes

Bypassing encryption at scale.

Inventory assessment and monetisation strategies.

Implementing countermeasures without compromising user experience.

 

Learning Objectives

Describe the journey from data breach to monetisation, identifying organisational vulnerabilities.

Demonstrate the use of tools for encryption bypass, including rainbow tables and credential stung.

Appreciate the importance of advanced encryption and effective password management.

Evaluate security measures to achieve the optimal balance between security and customer experience.

Align organisational cybersecurity strategies with identified threats.

Enquire Now

Want to find out more? Got a question you can’t find an answer for? Know your teams
need some training but not sure where to start? Leave us your details and we’ll get back to
you 🙂